The Intel Management Engine has been discovered to be vulnerable to various attacks, including those performed via the JTAG over USB. This week, Intel released a tool that will enable you to verify if your…
NSA leaked Cyber weapons continue to wreak havoc on the global business community. Just yesterday, the New York Times released a story speculating that the NSA was hacked, presumably with the same tools they use to exploit…
The Krack vulnerability disclosed by researchers publicly earlier this month, is a vulnerabiity in WPA2 WiFi networks (that includes most current home and work WiFi routers) that can allow for key reuse by a nearby…
My earlier findings I shared last August about how having WiFi simply turned on, makes you vulnerable to exploitation, have been validated by new research work published by KU Leuven describing this new vulnerability as…
There are many security issues relating to vulnerabilities in hardware firmware that now require a strict approach to handling ESI (Electronically Stored Information) belonging to clients and third parties. Just last week, LegalTech News published…